Powerful Protection against Ransomware

What’s New with Carbon Black App Control?

Learn how Carbon Black App control protects your endpoints and critical systems against Process Hollowing attacks.

Positive Security Model Reduces Attack Surface

Carbon Black App Control uses a Positive Security Model, or ‘Default Deny’ approach to reduce attack surface by automating the approval of trusted software. This allows you to protect against loss of productivity and reputation as well as address the needs of unique on-premise, public and private cloud environments, including End-of-life OS, air-gapped servers and fixed function devices.
Faster Time to Market

Positive Security Model

A Positive Security Model only allows access to trusted resources. Carbon Black App Control employs a positive security model to prevent unwanted changes to your critical systems.
Security and Control

Flexible Deployment

Security gaps can occur with IT and security cloud migration. Carbon Black App Control employs a Positive Security Model on-premise or on AWS, Azure or hosted private clouds.  
Ease of Use

Trusted Content Approval

Carbon Black App Control does not rely on easily outdated lists. It approves files with customizable mechanisms such as IT and cloud-driven trust, trusted publishers, custom rules and external sources.

Related Resources

Understand the Total Economic Impact of Carbon Black App Control

Avoid costs associated with loss of productivity and reputation caused by a security breach. Carbon Black App Control continuously protects against cyberthreats that evade traditional security defenses by employing a default/deny security posture. 

Carbon Black App Control Learning Path

Dive deep into our guided and curated learning path to get hands-on.

We couldn't find a match for given <KEYWORD>, please try again.
We couldn't find a match for given <KEYWORD>, please try again.
  • Datasheet
  • Fixed Function Devices
  • Critical System Lockdown and Application Control
  • eBook
  • Critical System Lockdown and Application Control
  • Incident Response
  • Risk and Compliance
  • Healthcare
  • eBook
  • Critical System Lockdown and Application Control
  • Fixed Function Devices
  • eBook
  • Next Generation Antivirus
  • Malware and Non Malware Protection
  • Report
  • Incident Response
  • Threat Hunting
  • Risk and Compliance
  • Financial Services
  • Webinar
  • Next Generation Antivirus
  • Incident Response
  • Vulnerability Management
  • Webinar
  • Risk and Compliance
  • Critical System Lockdown and Application Control
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Incident Response
  • Technology
We couldn't find a match for given <KEYWORD>, please try again.
  • Report
  • Incident Response
  • Threat Hunting
  • Risk and Compliance
  • Financial Services
  • eBook
  • Critical System Lockdown and Application Control
  • Incident Response
  • Risk and Compliance
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Critical System Lockdown and Application Control
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Incident Response
  • Technology
We couldn't find a match for given <KEYWORD>, please try again.
  • eBook
  • Critical System Lockdown and Application Control
  • Incident Response
  • Risk and Compliance
  • Healthcare
  • eBook
  • Critical System Lockdown and Application Control
  • Fixed Function Devices
  • Datasheet
  • Fixed Function Devices
  • Critical System Lockdown and Application Control
  • Webinar
  • Risk and Compliance
  • Critical System Lockdown and Application Control
  • Healthcare
  • eBook
  • Critical System Lockdown and Application Control
  • Fixed Function Devices
  • Datasheet
  • Fixed Function Devices
  • Critical System Lockdown and Application Control
  • Report
  • Incident Response
  • Threat Hunting
  • Risk and Compliance
  • Financial Services
  • Webinar
  • Next Generation Antivirus
  • Incident Response
  • Vulnerability Management
  • eBook
  • Critical System Lockdown and Application Control
  • Incident Response
  • Risk and Compliance
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Incident Response
  • Technology
  • eBook
  • Next Generation Antivirus
  • Malware and Non Malware Protection
  • Webinar
  • Next Generation Antivirus
  • Incident Response
  • Vulnerability Management
  • eBook
  • Next Generation Antivirus
  • Malware and Non Malware Protection
  • Report
  • Incident Response
  • Threat Hunting
  • Risk and Compliance
  • Financial Services
  • eBook
  • Critical System Lockdown and Application Control
  • Incident Response
  • Risk and Compliance
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Critical System Lockdown and Application Control
  • Healthcare
  • Webinar
  • Risk and Compliance
  • Incident Response
  • Technology
  • Report
  • Incident Response
  • Threat Hunting
  • Risk and Compliance
  • Financial Services
  • Webinar
  • Next Generation Antivirus
  • Incident Response
  • Vulnerability Management

Ready to Get Started?